Zero Trust + Defense in Depth
Layers plus a mindset: verify, minimize access, assume breach. Zero Trust principles: Verify explicitly. Use least privilege access. Assume breach. Defense in depth equals layers; Zero Trust equals how access is handled.

